2019
DOI: 10.1016/j.mejo.2019.05.017
|View full text |Cite
|
Sign up to set email alerts
|

Side-channel leakage from sensor-based countermeasures against fault injection attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…As an international common encryption algorithm, block cipher has been widely used in security systems such as IoT, aerospace, medical, transportation, finance, and identity verification [1][2][3][4][5]. Since the proposal of the advanced encryption standard (AES), as an important part of block cipher, many attack methods have emerged against its hardware and software [1,[5][6][7][8][9][10][11][12][13], and, among these attack methods, fault attacks have the advantages of high attack capability and low time complexity, which pose a great threat to the security of the AES [5,[11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…As an international common encryption algorithm, block cipher has been widely used in security systems such as IoT, aerospace, medical, transportation, finance, and identity verification [1][2][3][4][5]. Since the proposal of the advanced encryption standard (AES), as an important part of block cipher, many attack methods have emerged against its hardware and software [1,[5][6][7][8][9][10][11][12][13], and, among these attack methods, fault attacks have the advantages of high attack capability and low time complexity, which pose a great threat to the security of the AES [5,[11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Since the manifestation of a fault depends on the state of the logic gate under attack (Fig. 1), the adversary can monitor the response of the system to the attack (whether the alarm was raised or not), and depending on the response, probe the output of the logic gate indirectly (using Side Channel Analysis (SCA)) to acquire information [30], [31], [32].…”
mentioning
confidence: 99%